Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.804874
Kategorie:Web application abuses
Titel:EspoCRM '/install/index.php' Multiple Vulnerabilities
Zusammenfassung:This host is installed with EspoCRM and; is prone to multiple vulnerabilities.
Beschreibung:Summary:
This host is installed with EspoCRM and
is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple errors are due to:

- Improper sanitization of input passed via 'action' and 'desc' HTTP GET
parameters to /install/index.php script.

- Insufficient access control restriction to the installation script
/install/index.php.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to execute arbitrary HTML and script code in a users browser session
in the context of an affected site, include and execute arbitrary local PHP
files on the system with privileges of the web server, and reinstall the
application.

Affected Software/OS:
EspoCRM version 2.5.2 and probably
earlier.

Solution:
Upgrade to EspoCRM version 2.6.0 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: BugTraq ID: 70809
BugTraq ID: 70811
BugTraq ID: 70806
Common Vulnerability Exposure (CVE) ID: CVE-2014-7985
http://www.securityfocus.com/bid/70809
Bugtraq: 20141029 Multiple vulnerabilities in EspoCRM (Google Search)
http://www.securityfocus.com/archive/1/533844/100/0/threaded
http://blog.espocrm.com/news/espocrm-2-6-0-released
http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html
https://www.htbridge.com/advisory/HTB23238
Common Vulnerability Exposure (CVE) ID: CVE-2014-7986
http://www.securityfocus.com/bid/70811
Common Vulnerability Exposure (CVE) ID: CVE-2014-7987
http://www.securityfocus.com/bid/70806
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.